Sunday, December 30, 2012

Macintosh vs IBM

The IBM and Macintosh computers have been in competition with each other for years, and each
of them have their strong points. They both had their own ideas about where they should go in
the personal computer market. They also had many developments, which propelled themselves
over the other.
It all started when Thomas John Watson became president of Computing Tabulating Recording
in 1914, and in 1924 he renamed it to International Business Machines Corporation. He
eventually widened the company lines to include electronic computers, which was extremely new
in those days. In 1975 IBM introduced their first personal computer (PC) which was called the
Model 5100. It carried a price tag of about $9,000 which caused it to be out of the main stream
of personal computers, even though their first computer did not get off to as big as a start they
had hoped it did not stop them from continuing on. Later on IBM teamed up with Microsoft to
create an operating system to run their new computers, because their software division was not
able to meet a deadline. They also teamed up with Intel to supply its chips for the first IBM
personal computer. When the personal computer hit the market it was a major hit and IBM
became a strong power in electronic computers. Phoenix Technologies went through published
documentation to figure out the internal operating system (BIOS) in the IBM. In turn, they
designed a BIOS of their own which could be used with IBM computers. It stood up in courts and
now with a non IBM BIOS, the clone was created. Many manufacturers jumped in and started
making their own IBM Compatible computers, and IBM eventually lost a big share in the desktop
computers.
While IBM was just getting started in the personal computer market, Apple was also just getting
on its feet. It was founded by Steve Jobs and Steve Wozniak in 1976. They were both college
drop outs, Steve Jobs out of Reed College in Oregon and Steve Wozniak from the University of
Colorado. They ended up in Silicon Valley, which is located in northern California near San
Francisco. Wozniak was the person with the brains and Jobs was the one who put it all together.
For about $700 someone could buy a computer that they put together, which was called the
Apple I. They hired a multimillionaire, Armas Clifford Markkula, a 33 year old as the chief
executive in 1977. In the mean time Wozniak was working at Hewlett Packard until Markkula
encouraged him to quit his job with them, and to focus his attention on Apple. Apple went public
in 1977, for about $25 a share. In 1977 the Apple II was introduced which set the standard for
many of the microcomputers to follow, including the IBM PC.
The Macintosh and IBM computer have been in competition ever since they put out their first
personal computers. In 1980, the personal computer world was dominated by two types of
computer systems. One was the Apple II, which had a huge group of loyal users, and they also
had a large group of people developing software for the Apple II. The other system was the IBM-
Compatible, which for the most part all used the same software and plug in hardware. In 1983
Apple sold over $1 billion in computers and hardware. Now Apple was trying to appeal more to
the business world so they designed the Lisa computer that was a prototype for the Macintosh
and it cost around $10,000. It featured a never before seen graphical interface and the mouse,
which are as common as any other component on the computer today. IBM introduced a
spreadsheet program called Lotus 1-2-3, which caused anticipated sales of the Lisa computer to
drop to nearly half.
In order for Apple to compete with the IBM-Compatible they had to change some things around.
Jobs headed the development of the Macintosh, with the goal in mind of a "computer for the rest
of us." He wanted it to be easily set up out of the box and up in running in 15 minutes. The
developers of the Macintosh made it so that you could not upgrade it for they did not think that
you needed to open your computer. In 1984, they launched the Macintosh for $2,495. The
advertisements for it cost around $500,000 and more than $1.5 million to play it on Super Bowl
Sunday in 1984. They decided later that if they wanted to keep up with IBM they would have to
make the Macintosh cheaper and easier to upgrade in order to appeal to the business market. In
1991 Apple's desktop computing business was going down hill, and Motorola, who was their chip
manufacturer, was being known as the company that was always one step behind Intel. So
Apple lost developers for their personal computer.

This is the label on many of the current chips that are being shipped today.
One thing that is different between the IBM and Macintosh is the type of CPU architecture they
are using. The IBM computers have been using the same chip design as it did when it first
created the personal computer. They created their systems around a CPU design Intel created,
which used an architecture called CISC (Complex Instruction Set Computing). This also allowed
the IBM computer to be compatible through out the years with the older systems. For instance if
you had some sort of typing programming that was on an IBM-Compatible computer that had a
286-12 CPU, you could run that same exact software on one of your newest Pentiums today. So
even after 10 years the same software could be used. This also has it down sides, because that
means we have been using an internal CPU architecture that is at least 20 years old. One thing
that IBM users can look forward to is the advancements that Intel is making with it's CPUs. One
of the latest things that has hit the market is MMX, which allows programs that are more
graphically inclined to run faster, as well as programs that use sound. They already have chips
in the making going by the code name Klamath. These will be a cross form of the current
Pentium Pro chips and the Pentium MMX chips. They should be coming out in 1998, and will
have a MHz rating up to 400. Right now the MMX chips are shipping at 200 MHz and will soon
have one at 233 MHz. Intel is moving very swiftly in bringing us the top of the line technology.
Apple decided to go with a different CPU architecture. IBM created a RISC (Reduced Instruction
Set Computing) CPU that could run faster than the CISC model of the same MHz rating, so a
RISC chip with a MHz rating of 100 could run just as fast as a CISC chip with MHz rating of 133.
Now with the definitions of CISC and RISC you would think that the RISC chip has fewer
instructions, and actually in fact it is just the opposite, but since it started out with fewer
instructions then the CISC chip it kept that name. Now IBM did not want to put it into their own
personal computers because of the compatibility issues. The computer would not be able to use
the current hardware or software, that was being made for the IBM-Compatible computers. So
IBM sought out a company that would be willing to buy their RISC chip, and Apple was the
company they found. Motorola had previously been designing the chips for Apple, but they were
not as fast as IBM so the Macintosh development slowed down in comparison to IBM. IBM could
design RISC chips for Apple with no problem. With this Apple needed to get developers to make
applications made to run specifically for the RISC chip. IBM decided to team up with Motorola
because they were not equipped to put out chips in high volume like Apple needed. Apple had
already been creating a mother board based on the Motorola chip design, so with IBM and
Motorola teaming up they did not have to redesign their mother boards. So now an Apple
computer could run faster than an IBM, in a certain sense. A Macintosh Quadra 40 MHz using
Motorola 68040 chip would be faster than most 486DX-66 MHz CPUs. The reason being is that
the Macintosh computer was totally design to run with each other. So the Operating System in
the Macintosh would take advantage of the hardware's capabilities as well as the hardware
taking advantage of the Operating System. So with this interconnected system it would be faster
than a system not made to take advantage of every little thing in a piece of hardware.

Apple Macintosh Mouse
With the both companies in heated competition, the pressure was on for them to come out with
things that the other did not have. Apple came through very strongly in this area. They created
many devices that are used in many computers today. In 1984 Apple created the first GUI
(Graphical User Interface) this also brought about folders or directories, long file names, drag
and drop, and the trash can. All these devices are used in the more popular operating system
for the IBM-Compatible computer called Windows 95. Apple also created the mouse, which is as
common as the keyboard. One thing that helps the IBM-Compatible in the hardware area, is all
the third party developers. With the Apple computer, only Apple had the rights to develop
hardware for their computers. With IBM-Compatibles anyone can develop hardware for it, thus
we have many innovative accessories and hardware for the IBM-compatibles. One of the more
interesting devices for the IBM-compatible computers, that was featured at the 1997 Comdex
show in Vegas was a speaker system. It looks like a giant plastic dome that is placed above
your head pointing down towards you, and allows stereo sound to be heard only by the person
directly underneath it. One company that was showing it in action was Creative Labs, which is a
maker of Sound Cards and usually sets the standard for them. They had many computers
networked together and were running a popular game of 1996 called Quake, which is a first
person action game. They had put the dome shaped speakers above each computer station and
it allowed each player to hear what was going on around them, but it would not make any outside
noise or interfere with the person playing right next to them.

Installing a card can be very easy
One of the latest things with computers these days is Plug 'n' Play. It was meant to alleviate the
fear of people upgrading their computer themselves, even though some people will always pay
someone big time money to do it. If you are afraid of opening your computer it is strongly
suggested that you have a professional do it, for they have been doing that sort of thing for
years, and they know exactly what they are doing as well as what to do if they encounter any
problems that are uncommon to the regular consumer. The deal with Plug 'n' Play is that it
would allow you to install a new sound card or some other plug in card and then just turn on your
computer with out you having to change any jumpers or configure it in any way. The Macintosh
computer and the Windows 95 operating system both have this feature built into it as well as
some of the newer IBM-Compatible BIOS. There have been draw backs to it, for some of the
people that prefer to configure it themselves for the software used to configure the card might
not be able to use a configuration you wish to use.
Apple computers have many things that already come with it, that the IBM-Compatibles do not
always have. For instance they come with a 16-bit sound card, that has voice recognition built
into it. With the voice recognition the operating system was designed to use it in every way you
could think of, you could do anything without typing or clicking on a thing. For instance you
could tell it to "Shut Down" and it will go through and turn off the computer, or you could write a
letter to a long lost relative just by speaking. The Macintosh computer was designed so that
everything you did was made as easy as possible, so that is why all the software has to be
redone when they add new hardware. If you wanted to eject a disk you stuck into it, you went up
into the pull down menus and told it to "eject disk." You could also shut off the computer from
the pull down menus. This is basically the total opposite of the IBM-Compatible computers. To
eject the disk you just plainly press the little button on the disk drive, and if you wanted to turn off
the computer you just press the power button. The Macintosh computer could run into problems,
say if you had a disk in there and somehow the computer locked up or the power was off, you
would not be able to get that disk out of there. Some of the other things that the latest Macintosh
computers have been coming with are networking cards built into it already. If you wanted to
play a game or transfer files with a friend, you just grabbed a cord and plugged the two
computers together and then you are off. You could also do video conferencing and send email
over the network, as well.
With the way the Macintosh computer was designed you cannot upgrade the sound card for
everything is built into the system, but with an IBM-Compatible computer you could easily take
out one card and put in another. Anything that you add on to the Macintosh has to be put on the
outside, like CD-ROMs and Modems. Also because the Operating System of the Macintosh
relies on the computer's hardware and was designed for that particular hardware, if you ever
upgrade it you have to upgrade the operating system as well as many hardware components and
software that were made for that particular model. That is one reason many of the big time
business users would not want to buy a Macintosh for they would want their investment to last
awhile and if they needed to they would want to upgrade their systems as cheaply as possible
and the IBM-Compatible made it cheap for them to do so. The Macintosh computer itself usually
costs about two times as much as a comparable IBM computer. They also tend to confuse their
customers by bringing out many new models out all the time. For instance in 1993 alone, Apple
introduced 17 different models of their Macintosh computer.
Software for the Apple computers is harder to come by then for the IBM-compatible computer.
Apple controls all the software for their computers and will not license it to any other developer.
So you do not have the variety you do with the IBM computers. A big thing that has become
very popular in the last few years is something called the Internet. Almost everyone has
experienced the internet in some form or the other. You can almost do anything you wanted
over the internet. From writing a message to some distant relative and have it arrive to that
person in minutes, or playing a chess game with someone from Russia. You can also get any
program you are looking for over the internet, and many of these programs are usually only for
the IBM-compatible computer for there is more people with an IBM computer and thus more
people making applications and games for the IBM computer. So basically there is just a ton of
software out there for people who own an IBM-compatible computer.
With the IBM-compatible computer you can continue to upgrade it, even someone who bought a
computer five years ago could have upgraded it so that it is just as fast as any computer of
today, but with the Macintosh you basically would have to buy a new system. Also since IBM
had used a third-party for its operating system other companies could license the operating
system to make their own compatible operating systems, as well as any other software for it.
Compatible hardware could easily be assembled. As well as peripherals and components that
will improve the IBM compatible computer. From some of the common components, like CD-
ROMs, Modems, Sound Cards, and Printers. You even have a choice from about 20 different
styles of mice that you could use on your system, from three basic groups: Roller, Track balls,
and Touch Pads. They have some other ones, like one that clips onto your monitor and shoots
infrared beams across the screen to detect movements by your finger, and so it basically turns
your monitor into a touch screen. As well as hand held ones that move the cursor based on the
position of your hand.
The Apple computer has usually always appealed to the school systems. With the IBM-
compatible computers going more towards businesses and personal use. The main reasons
behind this are that the Apple had many types of software directed towards children and helping
them learn. They were also easier to use so that appealed to the school system, for they would
be able to have children that are five years old be able to use a computer with no problem. The
IBM computer went more with businesses, because of its ability to be upgraded and they would
be able to get longer use out of it. They could more easily adapt an IBM-compatible computer to
their way of doing things, just because of the many different software out there as well as its
ease of adding or upgrading it capabilities. The IBM-compatible computers have been becoming
increasingly more popular with the school systems, because of Apple going down hill and having
less and less software available for it.
The IBM and Macintosh computers have been in competition with each other for years, and each
of them have their strong points. Apple dominated in the personal computer market when it first
started, but when the IBM clone was created that started its downfall. Some of Apple's earlier
decisions caused it to lose in the battle with IBM as well. Motorola as its chip manufacturer,
caused them to be one step behind the Intel based IBM-compatibles. Not licensing out its
software so that third parties could create software for it, was also a down fall for it. Now, that
the IBM-compatible computer has a strong support it is very unlikely that Apple will be able to
bring back a large user group for its personal computer, even though their computers are faster.

ISDN vs Cable modems

1.0 Introduction


The Internet is a network of networks that interconnects computers around
the world, supporting both business and residential users. In 1994, a
multimedia Internet application known as the World Wide Web became
popular. The higher bandwidth needs of this application have highlighted
the limited Internet access speeds available to residential users. Even at 28.8
Kilobits per second (Kbps)-the fastest residential access commonly
available at the time of this writing-the transfer of graphical images can be
frustratingly slow.

This report examines two enhancements to existing residential
communications infrastructure: Integrated Services Digital Network (ISDN),
and cable television networks upgraded to pass bi-directional digital traffic
(Cable Modems). It analyzes the potential of each enhancement to deliver
Internet access to residential users. It validates the hypothesis that upgraded
cable networks can deliver residential Internet access more cost-effectively,
while offering a broader range of services.

The research for this report consisted of case studies of two commercial
deployments of residential Internet access, each introduced in the spring of
1994:

· Continental Cablevision and Performance Systems International (PSI)
jointly developed PSICable, an Internet access service deployed over
upgraded cable plant in Cambridge, Massachusetts;

· Internex, Inc. began selling Internet access over ISDN telephone
circuits available from Pacific Bell. Internex's customers are residences and
small businesses in the "Silicon Valley" area south of San Francisco,
California.


2.0 The Internet

When a home is connected to the Internet, residential communications
infrastructure serves as the "last mile" of the connection between the
home computer and the rest of the computers on the Internet. This
section describes the Internet technology involved in that connection.
This section does not discuss other aspects of Internet technology in
detail; that is well done elsewhere. Rather, it focuses on the services
that need to be provided for home computer users to connect to the
Internet.



2.1
ISDN and upgraded cable networks will each provide different functionality
(e.g. type and speed of access) and cost profiles for Internet connections. It
might seem simple enough to figure out which option can provide the needed
level of service for the least cost, and declare that option "better." A key
problem with this approach is that it is difficult to define exactly the needed
level of service for an Internet connection. The requirements depend on
the applications being run over the connection, but these applications are
constantly changing. As a result, so are the costs of meeting the applications'
requirements.

Until about twenty years ago, human conversation was by far the dominant
application running on the telephone network. The network was
consequently optimized to provide the type and quality of service needed for
conversation. Telephone traffic engineers measured aggregate statistical
conversational patterns and sized telephone networks accordingly.
Telephony's well-defined and stable service requirements are reflected in the
"3-3-3" rule of thumb relied on by traffic engineers: the average voice call
lasts three minutes, the user makes an average of three call attempts during
the peak busy hour, and the call travels over a bidirectional 3 KHz channel.

In contrast, data communications are far more difficult to characterize. Data
transmissions are generated by computer applications. Not only do existing
applications change frequently (e.g. because of software upgrades), but
entirely new categories-such as Web browsers-come into being quickly,
adding different levels and patterns of load to existing networks.
Researchers can barely measure these patterns as quickly as they are
generated, let alone plan future network capacity based on them.

The one generalization that does emerge from studies of both local and wide-
area data traffic over the years is that computer traffic is bursty. It does not
flow in constant streams; rather, "the level of traffic varies widely over
almost any measurement time scale" (Fowler and Leland, 1991). Dynamic
bandwidth allocations are therefore preferred for data traffic, since static
allocations waste unused resources and limit the flexibility to absorb bursts
of traffic.

This requirement addresses traffic patterns, but it says nothing about the
absolute level of load. How can we evaluate a system when we never know
how much capacity is enough? In the personal computing industry, this
problem is solved by defining "enough" to be "however much I can afford
today," and relying on continuous price-performance improvements in digital
technology to increase that level in the near future. Since both of the
infrastructure upgrade options rely heavily on digital technology, another
criteria for evaluation is the extent to which rapidly advancing technology
can be immediately reflected in improved service offerings.

Cable networks satisfy these evaluation criteria more effectively than
telephone networks because:

· Coaxial cable is a higher quality transmission medium than twisted
copper wire pairs of the same length. Therefore, fewer wires, and
consequently fewer pieces of associated equipment, need to be
installed and maintained to provide the same level of aggregate
bandwidth to a neighborhood. The result should be cost savings and
easier upgrades.

· Cable's shared bandwidth approach is more flexible at allocating any
particular level of bandwidth among a group of subscribers. Since it
does not need to rely as much on forecasts of which subscribers will
sign up for the service, the cable architecture can adapt more readily
to the actual demand that materializes.

· Telephony's dedication of bandwidth to individual customers limits
the peak (i.e. burst) data rate that can be provided cost-effectively.
In contrast, the dynamic sharing enabled by cable's bus architecture
can, if the statistical aggregation properties of neighborhood traffic
cooperate, give a customer access to a faster peak data rate than the
expected average data rate.



2.2 Why focus on Internet access?
Internet access has several desirable properties as an application to
consider for exercising residential infrastructure. Internet technology is
based on a peer-to-peer model of communications. Internet usage
encompasses a wide mix of applications, including low- and high-
bandwidth as well as asynchronous and real-time communications.
Different Internet applications may create varying degrees of
symmetrical (both to and from the home) and asymmetrical traffic
flows. Supporting all of these properties poses a challenge for existing
residential communications infrastructures.

Internet access differs from the future services modeled by other studies
described below in that it is a real application today, with growing
demand. Aside from creating pragmatic interest in the topic, this factor
also makes it possible to perform case studies of real deployments.

Finally, the Internet's organization as an "Open Data Network" (in the
language of (Computer Science and Telecommunications Board of the
National Research Council, 1994)) makes it a service worthy of study
from a policy perspective. The Internet culture's expectation of
interconnection and cooperation among competing organizations may
clash with the monopoly-oriented cultures of traditional infrastructure
organizations, exposing policy issues. In addition, the Internet's status
as a public data network may make Internet access a service worth
encouraging for the public good. Therefore, analysis of costs to provide
this service may provide useful input to future policy debates.


3.0 Technologies
This chapter reviews the present state and technical evolution of
residential cable network infrastructure. It then discusses a topic not
covered much in the literature, namely, how this infrastructure can be
used to provide Internet access. It concludes with a qualitative
evaluation of the advantages and disadvantages of cable-based Internet
access. While ISDN is extensively described in the literature, its use as
an Internet access medium is less well-documented. This chapter
briefly reviews local telephone network technology, including ISDN
and future evolutionary technologies. It concludes with a qualitative
evaluation of the advantages and disadvantages of ISDN-based Internet
access.

3.1 Cable Technology
Residential cable TV networks follow the tree and branch architecture.
In each community, a head end is installed to receive satellite and
traditional over-the-air broadcast television signals. These signals are
then carried to subscriber's homes over coaxial cable that runs from the
head end throughout the community


Figure 3.1: Coaxial cable tree-and-branch topology

To achieve geographical coverage of the community, the cables
emanating from the head end are split (or "branched") into multiple
cables. When the cable is physically split, a portion of the signal power
is split off to send down the branch. The signal content, however, is not
split: the same set of TV channels reach every subscriber in the
community. The network thus follows a logical bus architecture. With
this architecture, all channels reach every subscriber all the time,
whether or not the subscriber's TV is on. Just as an ordinary television
includes a tuner to select the over-the-air channel the viewer wishes to
watch, the subscriber's cable equipment includes a tuner to select
among all the channels received over the cable.



3.1.1. Technological evolution
The development of fiber-optic transmission technology has led cable
network developers to shift from the purely coaxial tree-and-branch
architecture to an approach referred to as Hybrid Fiber and Coax(HFC)
networks. Transmission over fiber-optic cable has two main advantages
over coaxial cable:

· A wider range of frequencies can be sent over the fiber, increasing
the bandwidth available for transmission;

· Signals can be transmitted greater distances without amplification.

The main disadvantage of fiber is that the optical components required
to send and receive data over it are expensive. Because lasers are still
too expensive to deploy to each subscriber, network developers have
adopted an intermediate Fiber to the Neighborhood (FTTN)approach.

Figure 3.3: Fiber to the Neighborhood (FTTN) architecture



Various locations along the existing cable are selected as sites for
neighborhood nodes. One or more fiber-optic cables are then run from
the head end to each neighborhood node. At the head end, the signal is
converted from electrical to optical form and transmitted via laser over
the fiber. At the neighborhood node, the signal is received via laser,
converted back from optical to electronic form, and transmitted to the
subscriber over the neighborhood's coaxial tree and branch network.

FTTN has proved to be an appealing architecture for telephone
companies as well as cable operators. Not only Continental
Cablevision and Time Warner, but also Pacific Bell and Southern New
England Telephone have announced plans to build FTTN networks.
Fiber to the neighborhood is one stage in a longer-range evolution of
the cable plant. These longer-term changes are not necessary to provide
Internet service today, but they might affect aspects of how Internet
service is provided in the future.

3.2 ISDN Technology
Unlike cable TV networks, which were built to provide only local
redistribution of television programming, telephone networks provide
switched, global connectivity: any telephone subscriber can call any
other telephone subscriber anywhere else in the world. A call placed
from a home travels first to the closest telephone company Central
Office (CO) switch. The CO switch routes the call to the destination
subscriber, who may be served by the same CO switch, another CO
switch in the same local area, or a CO switch reached through a long-
distance network.



Figure 4.1: The telephone network

The portion of the telephone network that connects the subscriber to
the closest CO switch is referred to as the local loop. Since all calls
enter and exit the network via the local loop, the nature of the local
connection directly affects the type of service a user gets from the
global telephone network.

With a separate pair of wires to serve each subscriber, the local
telephone network follows a logical star architecture. Since a Central
Office typically serves thousands of subscribers, it would be unwieldy
to string wires individually to each home. Instead, the wire pairs are
aggregated into groups, the largest of which are feeder cables. At
intervals along the feeder portion of the loop, junction boxes are placed.
In a junction box, wire pairs from feeder cables are spliced to wire pairs
in distribution cables that run into neighborhoods. At each subscriber
location, a drop wire pair (or pairs, if the subscriber has more than one
line) is spliced into the distribution cable.



Since distribution cables are either buried or aerial, they are disruptive
and expensive to change. Consequently, a distribution cable usually
contains as many wire pairs as a neighborhood might ever need, in
advance of actual demand.

Implementation of ISDN is hampered by the irregularity of the local
loop plant. Referring back to Figure 4.3, it is apparent that loops are of
different lengths, depending on the subscriber's distance from the
Central Office. ISDN cannot be provided over loops with loading coils
or loops longer than 18,000 feet (5.5 km).



4.0 Internet Access


This section will outline the contrasts of access via the cable plant with
respect to access via the local telephon network.


4.1 Internet Access Via Cable
The key question in providing residential Internet access is what kind of
network technology to use to connect the customer to the Internet For
residential Internet delivered over the cable plant, the answer is
broadband LAN technology. This technology allows transmission of
digital data over one or more of the 6 MHz channels of a CATV cable.
Since video and audio signals can also be transmitted over other
channels of the same cable, broadband LAN technology can co-exist
with currently existing services.

Bandwidth
The speed of a cable LAN is described by the bit rate of the modems
used to send data over it. As this technology improves, cable LAN
speeds may change, but at the time of this writing, cable modems range
in speed from 500 Kbps to 10 Mbps, or roughly 17 to 340 times the bit
rate of the familiar 28.8 Kbps telephone modem. This speed represents
the peak rate at which a subscriber can send and receive data, during
the periods of time when the medium is allocated to that subscriber. It
does not imply that every subscriber can transfer data at that rate
simultaneously. The effective average bandwidth seen by each
subscriber depends on how busy the LAN is. Therefore, a cable LAN
will appear to provide a variable bandwidth connection to the Internet

Full-time connections
Cable LAN bandwidth is allocated dynamically to a subscriber only
when he has traffic to send. When he is not transferring traffic, he does
not consume transmission resources. Consequently, he can always be
connected to the Internet Point of Presence without requiring an
expensive dedication of transmission resources.





4.2 Internet Access Via Telephone Company

In contrast to the shared-bus architecture of a cable LAN, the telephone
network requires the residential Internet provider to maintain multiple
connection ports in order to serve multiple customers simultaneously.
Thus, the residential Internet provider faces problems of multiplexing
and concentration of individual subscriber lines very similar to those
faced in telephone Central Offices.

The point-to-point telephone network gives the residential Internet
provider an architecture to work with that is fundamentally different
from the cable plant. Instead of multiplexing the use of LAN
transmission bandwidth as it is needed, subscribers multiplex the use of
dedicated connections to the Internet provider over much longer time
intervals. As with ordinary phone calls, subscribers are allocated fixed
amounts of bandwidth for the duration of the connection. Each
subscriber that succeeds in becoming active (i.e. getting connected to
the residential Internet provider instead of getting a busy signal) is
guaranteed a particular level of bandwidth until hanging up the call.

Bandwidth
Although the predictability of this connection-oriented approach is
appealing, its major disadvantage is the limited level of bandwidth that
can be economically dedicated to each customer. At most, an ISDN
line can deliver 144 Kbps to a subscriber, roughly four times the
bandwidth available with POTS. This rate is both the average and the
peak data rate. A subscriber needing to burst data quickly, for example
to transfer a large file or engage in a video conference, may prefer a
shared-bandwidth architecture, such as a cable LAN, that allows a
higher peak data rate for each individual subscriber. A subscriber who
needs a full-time connection requires a dedicated port on a terminal
server. This is an expensive waste of resources when the subscriber is
connected but not transferring data.













5.0 Cost

Cable-based Internet access can provide the same average bandwidth
and higher peak bandwidth more economically than ISDN. For
example, 500 Kbps Internet access over cable can provide the same
average bandwidth and four times the peak bandwidth of ISDN access
for less than half the cost per subscriber. In the technology reference
model of the case study, the 4 Mbps cable service is targeted at
organizations. According to recent benchmarks, the 4 Mbps cable
service can provide the same average bandwidth and thirty-two times
the peak bandwidth of ISDN for only 20% more cost per subscriber.
When this reference model is altered to target 4 Mbps service to
individuals instead of organizations, 4 Mbps cable access costs 40%
less per subscriber than ISDN. The economy of the cable-based
approach is most evident when comparing the per-subscriber cost per
bit of peak bandwidth: $0.30 for Individual 4 Mbps, $0.60 for
Organizational 4 Mbps, and $2 for the 500 Kbps cable services-versus
close to $16 for ISDN. However, the potential penetration of cable-
based access is constrained in many cases (especially for the 500 Kbps
service) by limited upstream channel bandwidth. While the penetration
limits are quite sensitive to several of the input parameter assumptions,
the cost per subscriber is surprisingly less so.

Because the models break down the costs of each approach into their
separate components, they also provide insight into the match between
what follows naturally from the technology and how existing business
entities are organized. For example, the models show that subscriber
equipment is the most significant component of average cost. When
subscribers are willing to pay for their own equipment, the access
provider's capital costs are low. This business model has been
successfully adopted by Internex, but it is foreign to the cable industry.
As the concluding chapter discusses, the resulting closed market
structure for cable subscriber equipment has not been as effective as the
open market for ISDN equipment at fostering the development of
needed technology. In addition, commercial development of both cable
and ISDN Internet access has been hindered by monopoly control of
the needed infrastructure-whether manifest as high ISDN tariffs or
simple lack of interest from cable operators.

Internet regulation

Government Intervention of the Internet


During the past decade, our society has become based solely on the ability to move large amounts of information across large distances quickly. Computerization has influenced everyone's life. The natural evolution of computers and this need for ultra-fast communications has caused a global network of interconnected computers to develop. This global net allows a person to send E-mail across the world in mere fractions of a second, and enables even the common person to access information world-wide. With advances such as software that allows users with a sound card to use the Internet as a carrier for long distance voice calls and video conferencing, this network is key to the future of the knowledge society. At present, this net is the epitome of the first amendment: free speech. It is a place where people can speak
their mind without being reprimanded for what they say, or how they choose to say it. The key to the world-wide success of the Internet is its protection of free speech, not only in America, but in other countries where free speech is not protected by a constitution. To be found on the Internet is a huge collection of obscene graphics, Anarchists' cookbooks and countless other things that offend some people. With over 30 million Internet users in the U.S. alone (only 3 million of which surf the net from home), everything is bound to offend someone. The newest wave of laws floating through law making bodies around the world threatens to stifle this area of spontaneity. Recently, Congress has been considering passing laws that will make it a crime punishable by jail to send "vulgar" language over the net, and to export encryption software. No matter how small, any attempt at government intervention in the Internet will stifle the greatest communication innovation of this century. The government wants to maintain control over this new form of communication, and they are trying to use the protection of children as a smoke screen to pass laws that will allow them to regulate and censor the Internet, while banning techniques that could eliminate the need for regulation. Censorship of the Internet threatens to destroy its freelance atmosphere, while wide spread encryption could help prevent the need for government intervention.
Jim Exon, a democratic senator from Nebraska, wants to pass a decency billregulating the Internet. If the bill passes, certain commercial servers that post pictures of unclad beings, like those run by Penthouse or Playboy, would of course be shut down immediately or risk prosecution. The same goes for any amateur web site that features nudity, sex talk, or rough language. Posting any dirty words in a Usenet discussion group, which occurs routinely, could make one liable for a $50,000 fine and six months in jail. Even worse, if a magazine that commonly runs some of those nasty words in its pages, The New Yorker for instance, decided to post its contents on-line, its leaders would be held responsible for a $100,000 fine and two years in jail. Why does it suddenly become illegal to post something that has been legal for years in print? Exon's bill apparently would also "criminalize private mail," ... "I can call my brother on the phone and say anything--but if I say it on the Internet, it's illegal" (Levy 53).
Congress, in their pursuit of regulations, seems to have overlooked the fact that the majority of the adult material on the Internet comes from overseas. Although many U.S. government sources helped fund Arpanet, the predecessor to the Internet, they no longer control it. Many of the new Internet technologies, including the World Wide Web, have come from overseas. There is no clear boundary between information held in the U.S. and information stored in other countries. Data held in foreign computers is just as accessible as data in America, all it takes is the click of a mouse to access. Even if our government tried to regulate the Internet, we have no control over what is posted in other countries, and we have no practical way to stop it.
The Internet's predecessor was originally designed to uphold communications after a nuclear attack by rerouting data to compensate for destroyed telephone lines and servers. Today's Internet still works on a similar design. The very nature of this design allows the Internet to overcome any kind of barriers put in its way. If a major line between two servers, say in two countries, is cut, then the Internet users will find another way around this obstacle. This obstacle avoidance makes it virtually impossible to separate an entire nation from indecent information in other countries. If it was physically possible to isolate America's computers from the rest of the world, it would be devastating to our economy.
Recently, a major university attempted to regulate what types of Internet access its students had, with results reminiscent of a 1960's protest. A research associate, Martin Rimm, at Carnegie Mellon University conducted a study of pornography on the school's computer networks. He put together quite a large picture collection (917,410 images) and he also tracked how often each image had been downloaded
(a total of 6.4 million). Pictures of similar content had recently been declared obscene by a local court, and the school feared they might be held responsible for the content of its network. The school administration quickly removed access to all these pictures, and to the newsgroups where most of this obscenity is suspected to come from. A total of 80 newsgroups were removed, causing a large disturbance among the student body, the American Civil Liberties Union, and the Electronic Frontier Foundation, all of whom felt this was unconstitutional. After only half a week, the college had backed down, and restored the newsgroups. This is a tiny example of what may happen if the government tries to impose censorship
(Elmer-Dewitt 102).
Currently, there is software being released that promises to block children's access to known X-rated Internet newsgroups and sites. However, since most adults rely on their computer literate children to setup these programs, the children will be able to find ways around them. This mimics real life, where these children would surely be able to get their hands on an adult magazine. Regardless of what types of software or safeguards are used to protect the children of the Information age, there will be ways around them. This necessitates the education of the children to deal with reality. Altered views of an electronic world translate easily into altered views of the real world. "When it comes to our children, censorship is a far less important issue than good parenting. We must teach our kids that the Internet is a extension and a reflection of the real world, and we have to show them how to enjoy the good things and avoid the bad things. This isn't the government's responsibility. It's ours (Miller 76)."
Not all restrictions on electronic speech are bad. Most of the major on-line communication companies have restrictions on what their users can "say." They must respect their customer's privacy, however. Private E-mail content is off limits to them, but they may act swiftly upon anyone who spouts obscenities in a public forum.
Self regulation by users and servers is the key to avoiding government imposed intervention. Many on-line sites such as Playboy and Penthouse have started to regulate themselves. Both post clear warnings that adult content lies ahead and lists the countries where this is illegal. The film and videogame industries subject themselves to ratings, and if Internet users want to avoid government imposed regulations, then it is time they begin to regulate themselves. It all boils down to protecting children from adult material, while protecting the first amendment right to free speech between adults. Government attempts to regulate the Internet are not just limited to obscenity and vulgar language, it also reaches into other areas, such as data encryption.
By nature, the Internet is an insecure method of transferring data. A single E-mail packet may pass through hundreds of computers from its source to destination. At each computer, there is the chance that the data will be archived and someone may intercept that data. Credit card numbers are a frequent target of hackers. Encryption is a means of encoding data so that only someone with the proper "key" can decode it.
"Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution.
Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing to hide. What if everyone believed that law-abiding citizens should use postcards for their mail? If some brave soul tried to assert his privacy by using an envelope for his mail, it would draw suspicion. Perhaps the authorities would open his mail to see what he's hiding. Fortunately, we don't live in that kind of world, because everyone protects most of their mail with envelopes. So no one draws suspicion by asserting their privacy with an envelope. There's safety in numbers. Analogously, it would be nice if everyone routinely used encryption for all their E-mail, innocent or not, so that no one drew suspicion by asserting their E-mail privacy with encryption. Think of it as a form of solidarity (Zimmerman)."
Until the development of the Internet, the U.S. government controlled most new encryption techniques. With the development of faster home computers and a worldwide web, they no longer hold control over encryption. New algorithms have been discovered that are reportedly uncrackable even by the FBI and the NSA. This is a major concern to the government because they want to maintain the ability to conduct wiretaps, and other forms of electronic surveillance into the digital age. To stop the spread of data encryption software, the U.S. government has imposed very strict laws on its exportation.
One very well known example of this is the PGP (Pretty Good Privacy) scandal. PGP was written by Phil Zimmerman, and is based on "public key" encryption. This system uses complex algorithms to produce two codes, one for encoding and one for decoding. To send an encoded message to someone, a copy of that person's "public" key is needed. The sender uses this public key to encrypt the data, and the recipient uses their "private" key to decode the message. As Zimmerman was finishing his program, he heard about a proposed Senate bill to ban cryptography. This prompted him to release his program for free, hoping that it would become so popular that its use could not be stopped. One of the original users of PGP posted it to an Internet site, where anyone from any country could download it, causing a federal investigator to begin investigating Phil for violation of this new law. As with any new technology, this program has allegedly been used for illegal purposes, and the FBI and NSA are believed to be unable to crack this code. When told about the illegal uses of his programs, Zimmerman replies:

"If I had invented an automobile, and was told that criminals used it to rob banks, I
would feel bad, too. But most people agree the benefits to society that come from
automobiles -- taking the kids to school, grocery shopping and such -- outweigh
their drawbacks." (Levy 56).

The government has not been totally blind to the need for encryption. For nearly two decades, a government sponsored algorithm, Data Encryption Standard (DES), has been used primarily by banks. The government always maintained the ability to decipher this code with their powerful supercomputers. Now that new forms of encryption have been devised that the government can't decipher, they are proposing a new standard to replace DES. This new standard is called Clipper, and is based on the "public key" algorithms. Instead of software, Clipper is a microchip that can be incorporated into just about anything (Television, Telephones, etc.). This algorithm uses a much longer key that is 16 million times more powerful than DES. It is estimated that today's fastest computers would take 400 billion years to
break this code using every possible key. (Lehrer 378). "The catch: At the time of manufacture, each Clipper chip will be loaded with its own unique key, and the Government gets to keep a copy, placed in escrow. Not to worry, though the Government promises that they will use these keys to read your traffic only when duly authorized by law. Of course, to make Clipper completely effective, the next logical step would be to outlaw other forms of cryptography (Zimmerman)."
The most important benefits of encryption have been conveniently overlooked by the government. If everyone used encryption, there would be absolutely no way that an innocent bystander could happen upon something they choose not to see. Only the intended receiver of the data could decrypt it (using public key cryptography, not even the sender can decrypt it) and view its contents. Each coded message also has an encrypted signature verifying the sender's identity. The sender's secret key can be used to encrypt an enclosed signature message, thereby "signing" it. This creates a digital signature of a message, which the recipient (or anyone else) can check by using the sender's public key to decrypt it. This proves that the sender was the true originator of the message, and that the message has not been subsequently altered by anyone else, because the sender alone possesses the secret key that made that signature. "Forgery of a signed message is infeasible, and the sender cannot later disavow his signature (Zimmerman)." Gone would be the hate mail that causes many problems, and gone would be the ability to forge a document with someone else's address. The government, if it did not have alterior
motives, should mandate encryption, not outlaw it.
As the Internet continues to grow throughout the world, more governments may try to impose their views onto the rest of the world through regulations and censorship. It will be a sad day when the world must adjust its views to conform to that of the most prudish regulatory government. If too many regulations are inacted, then the Internet as a tool will become nearly useless, and the Internet as a mass communication device and a place for freedom of mind and thoughts, will become non existent. The users, servers, and parents of the world must regulate themselves, so as not to force government regulations that may stifle the best communication instrument in history. If encryption catches on and becomes as widespread as Phil Zimmerman predicts it will, then there will no longer be a need for the government to meddle in the Internet, and the biggest problem will work itself out. The government should rethink its approach to the censorship and encryption issues, allowing the Internet to continue to grow and mature.



























Works Cited

Emler-Dewitt, Philip. "Censoring Cyberspace: Carnegie Mellon's Attempt to Ban
Sex from it's Campus Computer Network Sends A Chill Along the Info Highway."
Time 21 Nov. 1994; 102-105.

Lehrer, Dan. "The Secret Sharers: Clipper Chips and Cypherpunks." The Nation
10 Oct. 1994; 376-379.

"Let the Internet Backlash Begin." Advertising Age 7 Nov. 1994; 24.

Levy, Steven. "The Encryption Wars: is Privacy Good or Bad?" Newsweek 24
Apr. 1995; 55-57.

Miller, Michael. "Cybersex Shock." PC Magazine 10 Oct. 1995; 75-76.

Wilson, David. "The Internet goes Crackers." Education Digest May 1995; 33-36.

Zimmerman, Phil. (1995). Pretty Good Privacy v2.62, [Online]. Available Ftp:
net-dist.mit.edu Directory: pub/pgp/dist File: Pgp262dc.zip

Internet addiction

INVESTIGATIVE RREPORT OF INTERNET ADDICTION











Prepared for
Dr. Jere Mitchum









By
Marwan


November 4 , 1996














TABLE OF CONTENT



LIST OF ILLUSTRATIONS ..........................................................................................................iv
ABSTRACT .........................................................................................................................................v
INTRODUCTION ............................................................................................................................1
Purpose .........................................................................................................................................1
Growth Of The Internet ............................................................................................................1
THE ADDICTION .............................................................................................................................2
What causes it ..............................................................................................................................2
Symptoms .....................................................................................................................................3
How To Overcome The Addiction ................................................................................................4
The elements of any addiction ...........................................................................................4
CONCLUSION ..................................................................................................................................8
One Last Interesting Question ........................................................................................................9
REFERENCES .................................................................................................................................10

















LIST OF ILLUSTRATIONS




Figures

1. The number of networks connected to the Internet vs. Time.
2. The percentage of the Internet domains
3. Will the equation people = Internet Users be true in 2001?





































ABSTRACT


Investigative Report of Internet Addiction


The problem of Internet addiction is not very noticeable now and that's why not many people are taking it seriously, but what these people are failing to see is the connection between the very rapid growth of the Internet and the addiction problem. It is really simple logic the bigger the Internet get the more users will be which will lead to a bigger number of addicts that can have their lives as well as others corrupted by this behavior. The main objective of this paper is to make sure that all reader know and understand what Internet addiction is and how it can be solved or avoided. I can not offer a professional psychiatric solution but I believe if a person knows more about the addiction, the better chance they have to help themselves as well as others; that's why I have included a short summary of the elements of addiction.

I hope that by the time you read my paper you will have a better understanding about this issue to keep yourself as well as others of taking Internet addiction lightly.






























INTRODUCTION

Purpose

The purpose of this paper is to make you, the reader, alert and more aware of the newest type of addiction, Internet addiction. Many people would call it exaggeration to classify spending a lot of time on the Internet as an addiction, but since the subject is a fairly new not everybody is taking it as serious as they should be.

Growth of the Internet

I am sure that everybody knows what the Internet and used it at least a couple of times so there is no need for me to tell you what the Internet is. However, the incredible growth of the size and technology of the Internet is a fact well worth mentioning.

Ever since the Internet was commercially introduced to the public late in 1989 the number of the networks that form the Internet have been increasing exponentially. As you can see in figure 1 in the United States there is a new network connected to the Internet every 30 minutes.

Figure 1 Number of Networks connected (Source: ftp://nic.merit.edu/statistics/nsfnet)

Not all these networks are commercial, some are educational some are for organizations and some are simply networks that provide Internet services. All these different kind of networks can be identified on the Internet by their domain extension, or in other words the last three letters in the address -e.g. http://www.arabia.com is a commercial site because of the .com- in figure 2 the percentage of all four major domains is shown, and it is obvious that the big share goes to the commercial domains. It does not take a genius to figure out that since the Internet attracted that much commercial interest that means that more and more people are using the Internet, and even more are willing to spend time and money on it.





Figure 2 (Source of data: http://www.nw.com)


THE ADDICTION

With such vast growth of the Internet what is considered as a small problem can grow along with the Internet to cause an even bigger problem. In a recent publication in the Los Angeles Times Mathew McAlleseter reported on a survey conducted on the Internet by Victor Brenner who came up with the following results: "17% said that they spend more than 40 hours a week online, 31% said that their work performance had deteriorated since they started using the Internet, 7% got "into hot water" with their employers or schools for Internet related activities" (LA Times, 5/5/1996, pp A-18).However, Brenner acknowledges that his survey is unscientific in many ways; respondents are self-selected and many may be Internet researchers. On the other hand, Dr. Kimberly Young from the University of Pittsgurg-Bradford conducted a more accurate survey that included 396 men and women. In her point of view heavy on-line users in her study all met psychiatric criteria for clinical dependence applied to alcoholics and drug addicts. They had lost control over their Net usage and couldn't end it despite harmful effects on their personal and professional lives.
What Causes It

Finding a reason for Internet addiction can be as hard as finding a reason for smoking addiction, however, there are a couple of reasons that are obvious for some addicts:
* The power of instant access to all sorts of information and all kinds of people is a positive that can be overused.
* A different kind of community that can draw people who tend to "shy out" in the real world because this new virtual community does not require the social skill that real life does, all you have to do is be good on the keyboard.
* Adopting new personas and playing your favorite kind of personality is not hard when others can not see or hear you.
* Last but not least is the fascination with technology. This might be the best excuse -if there such a thing- to be addicted to the Internet, the information super highway, or cyber space.

Symptoms

When I was trying to collect more information about the symptoms of Internet addiction, I was surprised to find out that almost one half of the sites I visited took Internet addiction as a joke. So as a part of the research I decided to give you the top ten signs you may be addicted to the Internet :

10. You wake up at 3 a.m. to go to the bathroom and stop and check your e-mail on the way back to bed.
9. You get a tattoo that reads "This body best viewed with Netscape Navigator 2.0 or higher."
8. .You write down your URL when asked for your Home Address.
7. You turn off your modem and get this awful empty feeling, like you just pulled the plug on a loved one.
6. You spend half of the plane trip with your laptop on your lap...and your child in the overhead compartment.
5. Your home page sees more action than you do.
4. You start to notice how much this list describes you.
3. People ask why you turn your head to the side when you smile, i.e. :-) .
2. The last girl you picked up was a JPEG image.
1. Your modem burns up. You haven't logged in for two hours. You start to twitch. You pick up the phone and manually dial your service provider access number. You try to hum to communicate with the network. You succeed !!

On the more serious side, an Internet based support group for people who suffer from Internet addiction called the Internet Addiction Support Group (IASG) has established the Internet Addiction Disorder (IAD) to be the following:
A maladaptive pattern of Internet use, leading to clinically significant impairment or distress as manifested by three (or more) of the following, occurring at any time in the same 12-month period:

(I) tolerance, as defined by either of the following:
(A) A need for markedly increased amounts of time on Internet to achieve satisfaction.
(B) markedly diminished effect with continued use of the same amount of time on Internet.
(II) withdrawal, as manifested by either of the following :
(A) the characteristic withdrawal syndrome
(1) Cessation of (or reduction) in Internet use that has been heavy and prolonged.
(2) Two (or more) of the following, developing within several days to a month after Criterion 1:
(a) psychomotor agitation.
(b) anxiety.
(c) obsessive thinking about what is happening on Internet.
(d) fantasies or dreams about Internet.
(e) voluntary or involuntary typing movements of the fingers.
(3) The symptoms in Criterion 2 cause distress or impairment in social, occupational or another important area of functioning.
(B) Use of Internet or a similar on-line service is engaged in to relieve or avoid withdrawal symptoms.
(III) Internet is often accessed more often or for longer periods of time than was intended.
(IV) There is a persistent desire or unsuccessful efforts to cut down or control Internet use.
(V) A great deal of time is spent in activities related to Internet use (e.g., buying Internet books, trying out new WWW browsers, researching Internet vendors, organizing files of downloaded materials.)
(VI) Important social, occupational, or recreational activities are given up or reduced because of Internet use.
(VII) Internet use is continued despite knowledge of having a persistent or recurrent physical, social, occupational, or psychological problem that is likely to have been caused or exacerbated by Internet use (sleep deprivation, marital difficulties, lateness for early morning appointments, neglect of occupational duties, or feelings of abandonment in significant others.)
(Source: John Suler, Ph.D. - Rider University May 1996
http://www1.rider.edu/~suler/psycyber/SUPPORTGP.HTML)

How To Overcome The Addiction

Now that the problem has been established and given a fancy abbreviation (IAD), the next question is what to do about it. Several groups of people created support groups dedicated to help people who suffer from IAD. Some of the most famous support groups is the IASG which can be reached by a-mail at listserv@netcom.com and the Webaholics support group which can be reached on http://www.webaholics.com . However, the main key to getting rid of , or even avoiding, any type of addiction is to understand the basic elements of the addiction. Once you understand these elements you will have a better chance of overcoming the addiction or even not getting it at all.

The elements of addiction are :
(I) Denial
All people who are addicted (to anything) have some degree of denial. Without denial, most addictions would not have become established in the first place.
Denial can take many forms. At the milder extremes, a person may believe "I can handle this problem whenever I decide to do so." The fact that one has a problem is at least acknowledged. At the other extreme, denial often takes the form of: "What problem? I don't have a problem. You've got the problem, Dude. And besides, you're beginning to tick me off!"
(II) Failing to Ask for Help
The second trademark of most addictions is that people affected are very reluctant to ask for help. The mindset of most addicts is: "I can beat this myself." Not only are they reluctant to ask other people for help, but even when they do, they don't accept the advice of others easily.
The best thing to do is to look for individuals or professionals who know how to cure addicted people. While these resource people are rare, you should keep looking for them. If you hook up with someone who claims to have this ability, look at your results and don't hang around too long with this person if you don't see yourself making progress. Keep looking for the right experienced helper and you will eventually find one that works well with you.
(III) Lack of Other Pleasures In Other Activities
One thing that is true about most addictions is they are often either the only or the strongest source of pleasure and satisfaction in a person's life.
People who become addicted often do so because their lives are not fulfilling. They can't seem to find passion, enjoyment, adventure, or pleasure from life itself, so they have to get these pleasures in other ways.
This becomes important when you try to end your addiction. If you try to eliminate your main source of pleasure in life without being able to replace it immediately with other sources of pleasure, it is doubtful you will be able to stay away from your addictive behaviour very long.
(IV) Underlying Deficiencies in Other Aspects of Life
Addiction should never be viewed as a problem in and of itself. Addictions are much better viewed as a symptom of other underlying problems and deficiencies. This is why most addiction therapies are so universally unsuccessful.
To cure most addictions, you must look beyond the addiction itself and deal with underlying deficiencies in coping and life management skills that have given rise to it.
For example, people who become addicted to alcohol and other drugs usually have serious deficiencies in their life management, stress management, and interpersonal skills. Early on in life, they experience a great deal of pain and personal suffering that they can't figure out how to deal with effectively. This drives them to seek external relief and comfort in the form of alcohol or other substances. As this pattern of behaviour gets repeated over time, their bodies become physically addicted to the chemical substance, and the addiction then becomes even more difficult to end.
The same is true for cigarette addiction. Many people find that smoking helps them cope with stress or keep their weight under control. Even if they are successful at beating the physical part of cigarette addiction, they often quickly return to smoking because they fail to improve their repertoire of coping skills.
So if you are trying to deal with the problem of Internet Addiction, or any addiction for that matter, you should ask yourself the following questions:
1. What stress management skills or life management skills do I lack that led me to become addicted?
2. What problems in life do I have that my addiction helps me to avoid or to "solve."
3. What would I need to learn how to do in order to let go of my addictive behaviour?
4. What "benefits" or payoffs am I getting from my addictive behaviour?

(V) Giving in to Temptation
Once you decide to eliminate an established addiction, there are certain requirements and pitfalls you must be prepared for. One of these is dealing with temptation.
Whenever you try to stay away from something that previously gave you great pleasure, you're going to be tempted to return to that behaviour. Sometimes, the temptation may be very strong. But even if it is, you must be prepared to resist it.
Temptation, in truth, is nothing more than a powerful internal feeling state ,i.e. a desire. It is often accompanied by thoughts as well, that are designed to make you "cave in" and satisfy your intense internal cravings.
You, however, are always much stronger than any of your internal thoughts, feelings, or other internal states. You have the power to consistently ignore or to choose not to respond to your thoughts and demanding feelings. Thoughts and feelings have very little power at all (even though many people mistakenly "feel" that their thoughts and feelings are much more powerful than they).
Once you take on the challenge of dealing with any addiction, you will need to marshal your ability to successfully deal with temptation. If you don't have a sense that you have this power to succeed, you can use your addiction as an opportunity to discover that you really do have this important capability.
(VI) Failing to Keep Your Word
In order to change any established habit, be it an addiction or not, you must be able to give your word to yourself and KEEP YOUR WORD NO MATTER WHAT HAPPENS. All behaviour change involves deciding what actions are needed to break the established pattern and then taking those actions on a consistent basis over time. This is just another way of saying "you must give your word to yourself every day that you will do this or that or not do this or that. Then you must keep your word, no matter what happens around you or what temptations or seductive excuses you encounter."
Many addiction treatment programs fail because addicts are not empowered to rehabilitate their ability to give and keep their word. Many addicts, experience has shown, are very accomplished liars. Their promises and statements to others often can't be trusted. And their ability to keep promises to themselves is similarly impaired.
Without the ability to give and keep your word, especially to yourself, you've got very little chance of curing any addiction. On the other hand, if you make this goal part of your overall game plan, you may be able to emerge from your addiction a stronger, healthier, and more trustworthy human being.
(VII) Failing to Do What May Be Necessary
Be very clear about this one important point: ALL ADDICTIONS CAN BE CURED AS LONG AS THEY AGREE TO DO WHATEVER MIGHT BE NECESSARY. One reason most addictions appear to be "incurable" is because people shy away from the types of actions that are often necessary.
What types of actions are these? Well, they can be numerous, diverse, and highly specific for any individual. They might include any or all of the following (using Internet Addiction as an example):
1. Setting an absolute schedule or time limit for how much time you spend on the Internet.
2. Forcing yourself to stay away from the Internet for several days at a time.
3. Placing self-imposed computer "blocks" on certain types of recreational programs, which include the web browser.
4. Setting an absolute policy for yourself of never signing on to the net at work (unless this is required for your study).
5. Establishing meaningful (but not harmful) consequences for yourself for failing to keep your word.
6. Applying these self-imposed consequences until you do regain your ability to keep your word consistently.
7. Forcing yourself to do other things instead of spending time on the net.
8. Resolving to learn how to derive other more healthy sources of pleasure in life to replace or even exceed the pleasure you got from being on the Internet.
9. Asking for help whenever you feel you are not being successful.
10. Avoiding people or environments that might encourage you to return to your addictive behaviour, this might be impossible in college but it still is a good point.

These are not the only actions that can be taken, many of them will work for a majority of individuals. The point is that in order to cure an addiction, you've got to be willing to do things that may seem drastic or outrageous but not harmful to yourself or others.
So if you have a history of failing to make any type of desired behaviour change, all this may mean is that you weren't willing to do what is necessary. All addictions (and other dysfunctional behaviours) can ultimately be cured. It's just a matter of figuring out what specific actions will work (and will not cause you or others harm) and then executing those actions despite any thoughts or feelings you might have to the contrary.
(VIII) Failing to Anticipate and Deal With Relapses
No matter how much initial success you have in eliminating an addiction, unintended relapses are just around the corner. Something unexpected might happen in your life or you might otherwise succumb to a moment of weakness.
Good addiction treatment plans anticipate that such relapses commonly occur and prepare individuals to deal with them successfully.
A relapse does not mean that you have failed in your efforts to cure yourself of an addiction. If you stay away from cigarettes for 3 months and then smoke again for two days in a row, you can view this as a "failure" if you want, or you can focus on the fact that of the last 92 days, you successfully abstained for 97% of them. That's pretty good.
The trick is to keep 2 days from becoming 5 days, or 5 days from becoming 10 days, etc. Here you will need a game plan to keep an occasional relapse from triggering a return to the addiction.
Once you understand these elements, chances are you will not be and addict for long. And for those who were close, I don't think that you are smart enough not to get sucked in.

CONCLUSION

Internet addiction is a serious addiction that should not be taken lightly, it might not be life threatening like some drug addiction, but it can very harmful to the person professional and personal life. The key to staying away from this addiction is to understand its elements and have a strong will power to control one's self from all the temptations that the Internet might provide.

One Last Interesting Question

We all know that more and more people are gaining access to the Internet some way or another, but not every body had the chance of looking at figure 3 !

Figure 3. Will the equation people = Internet Users be true in 2001? (Source: ftp://nic.merit.edu/statistics/nsfnet)








REFERENCES




Elias, M. (7/7/1996) Net overuse called "true addiction", USA Today, pp 1-A.

McAllester, M. (5/5/1996), Study says some may be addicted to the Net; Bulldog Edition.,
Los Angeles Times, , pp A-18.

Network Wizards, [online]
Available URL: http://www.nw.com/zone/

Rodgers, J. (1994), Treatments that works, Vol. 27, Psychology Today, pp 34.

Young, Kimberly, Centre of on-line addiction (COLA), [online]
Available URL: http://www.pitt.edu/~ksy/

Merit Network Inc., [online]
Available URL: ftp://nic.merit.edu/statistics/nsfnet/








iv

Improving Cyberspace

Improving Cyberspace
by
Jason Crandall
Honors English III
Research Paper
26 February 1996



Improving Cyberspace

Thesis: Though governments cannot physically regulate the
Internet, cyberspace needs regulations to prevent
illegal activity, the destruction of morals, and child
access to pornography.

I. Introduction.

II. Illegal activity online costs America millions and hurts
our economy.
A. It is impossible for our government to physically
regulate cyberspace.
1. One government cannot regulate the Internet by
itself.
2. The basic design of the Internet prohibits
censorship.
B. It is possible for America to censor the Internet.
1. All sites in America receive their address from
the government.
2. The government could destroy the address for
inappropriate material.
3. Existing federal laws regulate BBS's from
inappropriate material.

III. Censoring the Internet would establish moral standards.
A. Pornography online is more harsh than any other
media.
1. The material out there is highly perverse and
sickening.
2. Some is not only illegal, but focuses on
children.
B. Many industries face problems from illegal activity
online.
1. Floods of copyrighted material are illegally
published online.
2. Innocent fans face problems for being good fans.

IV. Online pornography is easily and illegally accessible
to minors.
A. In Michigan, anyone can access anything in
cyberspace for free.
1. Mich-Net offers most of Michigan access with a
local call.
2. The new Communications Decency Act could
terminate Mich-net.
B. BBS's offer callers access to adult material
illegally.
1. Most BBS operators don't require proof of age.
2. Calls to BBS's are undetectable to a child's
parents.

V. Conclusion.






Improving Cyberspace

"People don't inadvertently tune into alt.sex.pedophile
while driving to a Sunday picnic with Aunt Gwendolyn" (Huber).
For some reason, many people believe this philosophy and
therefore think the Internet and other online areas should not be
subject to censorship. The truth is, however, that computerized
networks like the Internet are in desperate need of regulations.
People can say, do, or create anything they wish, and as America
has proved in the past, this type of situation just doesn't work.
Though governments cannot physically regulate the Internet,
cyberspace needs regulations to prevent illegal activity, the
destruction of morals, and child access to pornography.
First, censoring the online community would ease the tension
on the computer software industry. Since the creation of the
first computer networks, people have been exchanging data back
and forth, but eventually people stopped transferring text, and
started sending binaries, otherwise known as computer programs.
Users like the idea; why would someone buy two software packages
when they could buy one and trade for a copy of another with a
friend? This philosophy has cost the computer industry millions,
and companies like Microsoft have simply given up. Laws exist
against exchanging computer software; violators face up to a
$200,000 fine and/or five years imprisonment, but these laws are
simply unenforced. Most businesses are violators as well.
Software companies require that every computer that uses one of
their packages has a separate license for that software
purchased, yet companies rarely purchase their required minimum.
All these illegal copies cost computer companies millions in
profits, hurting the company, and eventually hurting the American
economy.
On the other hand, many people believe that the government
cannot censor the Internet. They argue that the Internet is an
international network and that one government should not have the
power to censor another nation's telecommunications. For
example, American censors can block violence on American
television, but they cannot touch Japanese television. The
Internet is open to all nations, and one nation cannot appoint
itself police of the Internet. Others argue that the design of
the Internet prohibits censorship. A different site runs every
page on the Internet, and usually the location of the site is
undetectable. If censors cannot find the site, they can't shut
it down. Most critics believe that America cannot possibly
censor the Internet.
Indeed, the American government can censor the Internet.
Currently, the National Science Federation administers all
internet addresses, such as web addresses. The organization
could employ censors, who would check every American site
monthly. Any site the censors find with illegal material could
immediately lose their address, thus shutting down the site.
Some might complain about cost, but if the government raised the
annual price to hold an address from a modest $50 to say $500,
they could easily afford to pay for the censors. This would not
present a problem, because mostly businesses own addresses; it
would not effect use by normal people. For example,
microsoft.com is the address for Microsoft, but addresses like
crandall.com just do not exist. Bulletin Board Systems (BBS's)
are another computer media in need of censorship. Like the
Internet, some spots contain hard core pornography, yet some have
good content. Operators usually orient their BBS's for the local
community, but some operators open their system to users across
the world. The government can shut down a BBS if it transfers
illegal material across a state border according to federal law.
As a postal worker in Tennessee showed, shutting down a BBS with
illegal pornography is an easy process. When he called a BBS in
California and found illegal child pornography, he called his
local police. Two days later the police had closed the BBS and
Robert Thomas was awaiting prosecuting in a Tennessee jail
(Elmer-Dewitt). If the government were to employ censors like
that postal worker, thousands of BBS's transmitting illegal
material across state borders could be shut down immediately.
Secondly, censoring cyberspace would help establish moral
standards. According to a local survey, 83% of adults online
have downloaded pornographic material from a BBS. 47% of minors
online have downloaded pornographic material from a local BBS
(Crandall). In another world wide survey, only 22% of 571
responders thought the Internet needed regulation to prevent
minors from obtaining adult material (C|Net). Obviously,
something is wrong with America's morals. A child cannot walk
into a video store and walk out with X-rated movies. A minor
cannot walk out of a bookstore with a copy of Playboy. Why can
children sit in the privacy of their home and look at
pornographic material and we do nothing about it? It is time
America does something to establish moral standards.
Certainly, people accepted the fact that pornography exists
many years ago. In addition, however, they set limits as to how
far pornography could go, yet cyberspace somehow snuck past these
limits. Just after the vote on the Exon bill, Senator Exon said
"I knew it was bad, but when I got out of there, it made Playboy
and Hustler look like Sunday-School stuff" (Elmer-Dewitt). He
was talking about the folder of images from the Internet he
received to show the Senate just before the vote. An hour later,
the vote had passed 84 to 16. Demand drives the market, it
focuses on images people can't find in a magazine or video.
Images of "pedophilia (nude photos of children), hebephilia
(youths) and what experts call paraphilia -- a grab bag of
'deviant' material that includes images of bondage,
sadomasochism, urination, defecation, and sex acts with a
barnyard full of animals" (Elmer-Dewitt) floods cyberspace. Some
wonder how much of this is available, a Carnegie Mellon study
released last June showed that the Internet transmitted 917,410
sexually explicit pictures, films, or short stories over the 18
months of the study. Over 83% of all pictures posted on USENET,
the public message center of the Internet, were pornographic
(Elmer-Dewitt). What happened to our Information Superhighway,
is this what we are fighting to put into our schools?
Furthermore, illegal material other than pornography is
making its way online. When companies such as Paramount and FOX
realized they were loosing money because they were not online,
they took action. They realized that people make money online
just like they do on television. Several people make fan pages
with sound and video clips of their favorite television programs.
When companies heard of this, they wanted to do it themselves,
and sell advertising positions on their pages like with
television. Now these companies are pushing for court orders to
shut down these fan pages due to copyright infringement
(Heyman 78). If someone censored these pages for copyrighted
material in the first place, neither the company nor the owner of
the page would waste time and money in these legal matters. Now,
the company can sue the owner of the page for copyright
infringement. All this because some Star Trek fan wanted to
share some sound clips with other fans.
Most important, online pornography is easily accessible to
minors. What are parents to do, usually it is the child in the
family who is computer literate. If the child was accessing
pornographic material with computers, odds are the parents would
never know. Even if the parents are computer literate, children
can find it, even without looking for it. When 10 year old
Anders Urmachen of New York City hangs out with other kids in
America On Line's Treehouse chat room, he has good clean fun.
One day, however, when he received a message in e-mail with a
file and instructions on how to download it, he did. When he
opened the file, 10 clips of couples engaged in heterosexual
intercourse appeared on the screen. He called his mother who
said, "I was not aware this stuff was online, children should not
be subject to these images" (Elmer-Dewitt). Poor Anders Urmachen
didn't go looking for pornography, it snuck up on him, and as
long as America allows it to happen, parents are going to have to
accept the chance that their children may run into that stuff.
In addition, for several years the people of Michigan have
enjoyed access to the Internet through the state funded program
called Mich-Net. The program offers the public free access to
the Internet, along with schools throughout the state. On the
other hand, the Mich-Net program has one flaw. The program gives
anonymity, allowing anyone, of any age, to access anything on the
Internet. According to the new Communications Decency Act, which
Clinton signed into law February 8, 1996, the government could
terminate the entire Mich-Net program because a minor can access
pornography through it. This would be a huge loss to the state
of Michigan and it's schools. If we were to censor the Internet,
minors wouldn't be able to access the material, and the program
would have no problems.
Furthermore, BBS's offer minors adult material at no cost.
While some BBS's that only offer adult material to adults, others
make access very simple. Some simply say "Type YES if you are
over 18." This is simply unexplainable and unacceptable. Others
require a photo copy of a driver license showing the user is over
18, and other operators even require meeting their users. If all
it takes to access adult material is hitting three keys, what is
stopping children from it. Most young children do not have the
ability to decide where they should go and where they should not.
If it is available, they are going to want to see what it is. To
extend the problem further, these BBS's are usually undetectable
to a child's parents. Most BBS's are local phone calls, and are
free; the parents will never know if the child is accessing it.
For example, the Muskegon area has about 15 BBS's running 24
hours daily. Of these 15, about five operators devote their BBS
to adult material. Of these five, only one BBS requires that the
user meet the operator before receiving access, while three of
the boards simply ask for a photo copy of a drivers license. But
that last one has no security whatsoever, and anyone can access
anything. None of the five boards charge for access. This is
simply unacceptable, we cannot let children access adult material
in this manner.
Every day thousands of children tune into sex in cyberspace.
We do not subject our children to sex on television or other
medias, and even if we do, parents have ways to block it. Yet we
allowed computers to slip through the grips of parents.
Censoring the online community will also strengthen the computer
industry and eventually our economy. The longer we wait, the
more we hurt ourselves; let's regulate cyberspace before it is
too late.


Works Cited

C|Net. Survey Internet: 29 July 1995.
Crandall, Jason. Survey Muskegon, Michigan: 29 Jan. 1996.
Elmer-Dewitt, Philip. "On a Screen Near You: Cyberporn." Time
3 July 1995: Proquest.
Heyman, Karen. "War on the Web." Net Guide Feb. 1996: 76-80.
Huber, Peter. "Electronic Smut." Forbes 31 July 1995: 110.

Improvements to the School Districts Local Area Network

Introduction

This evaluation of our school district's network of personal computers will closely examine the current system and identify potential improvements to this system. This evaluation will be of the administrative departments in the school district which are handled separately from the educational departments.

Logistics of the Network
The logistics of the computer systems currently in use break out as such: Approximately 500 personal computers, 21 file servers, a Digital VAX, an Ethernet network running at 10 megabits that spans 52 buildings with wide area network links running at 56 kilo bits per second to 1.55 million bits per second. The primary operating system in use is Microsoft Windows 3.11, but Windows 95 is being phased in to become the primary workstation operating system. Novell Netware 3.12 is the primary network operating system, but Windows NT is being phased in to become the primary network operating system.

Each personal computer in use is utilized, for the most part, by only one user. This means that each system has a standard configuration at the system level, but at the GUI level the users are free to set up their environment however they wish. Virtually every administrative employee in the School District has a personal computer on their desk that they need in order to perform their assigned tasks. Each user of the network is processing mainly text based documents. In some cases graphics are being imbedded into documents to increase the professional look of the document but this use minor use of graphics would not be considered desk top publishing. Since the school district's departments are separated by function, there is no need for video teleconferencing and it is not being used.

Evaluation of System Configuration
Currently each building is handled as if it were a separate organization. Each site has it's own server, and all of the accounts are stored on the local server. Also everyone of the applications in use are stored on each client's workstation. This configuration is excellent for fault tolerance because each server can operate without the presence of any other server.

a. Servers
The servers were evaluated for manufacturer service support, available disk space, Random Access Memory present, processor speed, built in fault tolerance, and the type of network interface card being used.

The server's in use are actually personal computers that have had additional memory and larger hard drives installed so that they could be used in a server capacity. The manufacturer of the computers being used as servers is Gateway 2000. This companies service support is handled through phone and mail only. If there is a hardware problem with a component of the server, it will take at least 24 hours to receive a replacement part. This turn around time is not acceptable because as many as 200 employees would not be able to work while the server that they use is down.

The processors that are in use are Intel Pentium 90 MHz processors. This processor speed is adequate for the average demands being put on the server. This speed could become a problem with upgrades to different network operating systems, but for current utilization the processors are adequate. This is supported by the fact that average server utilization is 14% of the servers capability and by the fact that the servers are used as file servers only.

Built in fault tolerance on the servers is non-existent. The server configuration has only one hard drive, one controller card and usually no tape backup. If any component of the server fails, then the server will be down. The only backup being done on any server is from one tape backup unit on the main server is the MIS department. This is not effective because not all servers can be backed up every night. A bi-weekly or monthly backup may be the only backup available for any server. This is an extremely weak area in this network.

The network interface cards being used are SMC 's 32 bit Peripheral Component Interconnect (PCI) cards. These cards have a lifetime warranty and are replaced within 24 hours by the manufacturer. This type of card is adequate for the traffic being put on them by the users of the network. Current network speed only reach up to 10 million bits per second, and these cards support that very well. A nice feature of this type of cars is that it can be ordered with the BNC, thin net type of connector or the 10-base-T twisted pair connector. This allows greater flexibility when implementing their use.

b. Client "IBM Compatible" Personal Computers
The systems being used by the school district vary greatly from age, speed, and configuration. The average system being used is a 486 66 MHz Gateway PC with 8 megabytes of RAM and a 540 megabyte hard drive. There are also some 386-25 MHz computers still being used, but they are being replaced with Pentium 100 MHz systems. It would be impossible to examine each systems configuration and include it in this report but the districts standard configuration which is being implemented has been included. This represents the software being put on the systems and where they are stored.

The Configuration of the district's personal computers follows.

I. Operating System

1. Microsoft Windows 95

II. Default Applications.

1. Microsoft Office Version 7.0
a. Microsoft Word 7.0
b. Microsoft Access 7.0
c. Microsoft Excel 7.0
d. Microsoft Presentation 7.0
e. Microsoft Scheduler 7.0

2. Word Perfect Version 6.1
3. Quattro Pro Version 5.1
4. Insync Co-Session Remote Version 7.0
5. Reflections Version 5.1
6. F-Prot Professional for Windows 95 Version 2.22.1

III. Protocols

1. Microsoft IPX/SPX
2. Microsoft Netbeui
3. Walker, Richie and Quinn's LAT protocol Version 4.03

IV. Clients

1. Microsoft Windows Client
2. Microsoft Netware Client

V. Installed Printer Drivers

1. Hewlett Packard Laser Jet
2. Hewlett Packard Laser Jet Series II
3. Hewlett Packard Laser Jet 4/4M Plus

VI. Network Interface Card

1. Hewlett Packard Ethertwist Plus (27245B)

VII. Display configuration

1. Resolution and Refresh rate.
a. Super VGA 640 X 480
b. 75 Hertz


I. Windows 95 Environment Configuration

1. Auto Arrange: On
2. Accessibility Options: Off
3. Time Zone: Mountain
4. Screen Saver: Flying Windows (10 min delay)
5. Background: Blue Rivets
6. Installation Type: Typical
7. Desktop Icons:
a. Recycle Bin
b. Microsoft Internet
c. My Computer (User Specific)
d. Network Neighborhood (School District )
e. Microsoft Network
f. Word Perfect Shortcut
g. Quattro Pro Shortcut
h. Microsoft Word Shortcut
i. Reflection Shortcut (District VAX)
j. My Briefcase



7. Toolbar Icons
a. F-Prot Dynamic Virus Protection
b. STB Vision or ATI

8. Microsoft Office Professional Toolbar


II. Default Application Configuration

1. Microsoft Office Version 7.0
a. Microsoft Word Version 7.0
1. Default File Path: C:\mydocu~1 (C:\My documents)
2. Timed Backup: 10 Mins
3. Backup Location: C;\mydocu~1
b. Microsoft Access Version 7.0
1. Default File Path: C:\mydocu~1 (C:\My documents)
2. Timed Backup: 10 Mins
3. Backup Location: C:\mydocu~1
c. Microsoft Excel
1. Default File Path: C:\mydocu~1 (C:\My documents)
2. Timed Backup: 10 Mins
3. Backup Location: C:\mydocu~1
d. Microsoft Presentation
1. Default File Path: C:\mydocu~1 (C:\My documents)
2. Timed Backup: 10 Mins
3. Backup Location: C:\mydocu~1
e. Microsoft Scheduler
1. No custom settings made.


2. Word Perfect 6.1
a. Default File Path: C:\mydocu~1 (C:\My documents)
b. Timed backup: 10 mins
c. Backup Location: C:\office\wpwin\wpdocs
d. Application Location: C:\office\wpwin


3. Quattro Pro
a. Default File Path: C:\mydocu~1 (C:\My documents)
b. Timed backup: 10 mins
c. Backup Location: C:\office\qpw
d. Application Location: C:\office\qpw


4. Insync Co-Session Remote Version 7.0
a. Protocols Supported
1. SPX
2. Netbeui
b. Only Host Installed


5. Reflections Version 5.1
a. Connection: via LAT
b. Static Host List:
1. CSPS01
2. CSPS02
3. CSPS03
4. CSPS04
c. Color: PC Default 2
d. Settings File: C:\rwin\settings.r2w
e. Key Remap: VT => PC Keyboard F1-F4 keys
f. Runs in a maximized window


6. F-Prot Professional
a. Floppy A: protection: Disinfect/Query
b. Floppy B: protection: Report Only
c. Fixed Disk C:\ protection: Disinfect/Query
d. Network Drives: Report Only
e. Dynamic Virus Protection (DVP): Disinfect/Query
1. Scan first full 1 MB of memory
2. Run in minimum amount of memory
3. No schedule set for full scan


III. Default Protocols

1. Microsoft IPX/SPX Compatible Protocol
a. Set as the default protocol
b. Auto configures to 802.2 or 802.3


2. Microsoft Netbeui


3. Walker, Richie and Quinn's LAT Protocol
a. Static Host List
1. CSPS01
2. CSPS02
3. CSPS03
4. CSPS04



IV. Clients
1. Microsoft Windows Client
a. Not set to log into a domain


2. Microsoft Netware Client
a. Preferred Server is local server (disabled on NT clients)


V. Installed Printer Drivers
1. Hewlett Packard LaserJet
2. Any local printer drivers


VI. Network Interface Card
1. Hewlett Packard Ethertwist
a. Interrupt Request: 10
b. Input / Output Base Address: 330
c. Set to 16-Bit Real Mode Driver (To support WRQ LAT)


VII. Display Configuration
1. Set to PC local display driver
2. Set to 640 X 480 Resolution
3. Set to 75 Hz Refresh Rate
4. Set to Large Icons


Comments on Evaluation
As the systems were being evaluated, it was apparent that the systems are to be self sufficient and almost completely independent of the server. Again, for fault tolerance reasons this is a good decision. This means that if one of the servers were to go down the only effect on the workstation would be that there wouldn't be any file sharing available and shared printing could not be done. These two factors would not prohibit employees from getting work done effectively. It would add some inconvenience, but the employees could still function.

The choice of Windows 95 as the operating system was based on the fact that the computers being used were IBM compatible which would demand an IBM compatible operating system. Also the users of the PC's would mostly being using the computer for one or two applications that were not processor demanding. Also, Windows 95 is superior to Windows 3.11 in maintainability, security ,and multitasking. It would seem that an operating system such as Windows NT would be to powerful and to costly to implement. Also, OS/2 would be to powerful and is not as compatible as Windows 95 is with DOS based applications. Therefore, it seems that Windows 95 was a good choice for this type of environment.

It is also apparent that the systems have been configured to be managed and repaired remotely with the application Co-Session Remote. This application is configured to allow a workstation to be remotely controlled by a system administrator from a PC on the same network. This application has been configured for use over IPX/SPX and Netbeui which means that the connection would be very fast. So, instead of using dial up connections at 28.8 kbps the system can be controlled at 10 mbps which is significantly faster.

One weakness of this configuration is the necessity to load drivers in Real Mode instead of the 32 bit mode of Windows 95. This is necessary because this system must connect to a VAX using the LAT protocol and the LAT protocol runs only in the 16 bit real mode. This limitation does not significantly slow down the workstation, but it does cause communication to be slightly slower with the server. As soon as the LAT protocol is upgraded to allow it to run, the faster environment the configuration of all Windows 95 based machines should be upgraded.

Potential Improvements
After performing an in depth study of the systems being used by the school district, the issue that needs most attention is data backup. Currently there is not a routine procedure in place to safeguard the districts data. This should be a major concern and steps should be taken to resolve this problem before a disaster occurs. Additionally, the use of real mode network drivers needs to be fazed out as soon as possible. The users currently do not see degradation in performance but as their applications become more network intensive the problems also will become greater. Outside of the backup problem and the real mode drivers all other critical areas have been sufficiently addressed to give the users a robust system that can be easily upgraded and managed.

Conclusion
The school district's personal computer network is one that is used to provide employees with a means to compile, process and disseminate information that is relevant to business operations. Currently the primary type of information being processed is text based with some use of imbedded graphical images. There is no other medium being used such as video teleconferencing being utilized over the network. The district is currently in the process of providing employees with Internet access to their desktop which is used for such activities as funds acquisition, consulting State bid lists and personal e mail. The support for these 500+ systems comes from only support one professional that has to support over 50 separate buildings. The result is that the district needs systems that are fast, reliable, inexpensive, low maintenance and have the ability to communicate with many other personal computers and servers.

This evaluation found that the district is not at the level that it needs to be but steps in the right direction are being made to get there. The computers have good software configurations and most users have all of the hardware they need to perform their job functions. If the district can acquire more personnel to support this network and come up with a routine backup plan then the users of the network could continue to support the school district effectively with the use of this well designed technology.